General

  • Target

    6f59f808e8e8d2a2d8f6c771ac2270800cd02abbc7ea4274b896e1b72143aab2

  • Size

    424KB

  • Sample

    210926-sxms1afah4

  • MD5

    4e488dd6b7fa3130e637073d6a419449

  • SHA1

    51405fcc3da5ef2b844f0bb8649367b124a4ecdb

  • SHA256

    6f59f808e8e8d2a2d8f6c771ac2270800cd02abbc7ea4274b896e1b72143aab2

  • SHA512

    6abbc82db75c88da4b70094737c1982f3abadd3229966b5798847577cb9b25d69c2694f16fbd324fee1fc11335f3b7cebd28091a3834a0c26a423cb77bc4fc5f

Malware Config

Extracted

Family

raccoon

Botnet

f6d7183c9e82d2a9b81e6c0608450aa66cefb51f

Attributes
  • url4cnc

    https://t.me/justoprostohello

rc4.plain
rc4.plain

Targets

    • Target

      6f59f808e8e8d2a2d8f6c771ac2270800cd02abbc7ea4274b896e1b72143aab2

    • Size

      424KB

    • MD5

      4e488dd6b7fa3130e637073d6a419449

    • SHA1

      51405fcc3da5ef2b844f0bb8649367b124a4ecdb

    • SHA256

      6f59f808e8e8d2a2d8f6c771ac2270800cd02abbc7ea4274b896e1b72143aab2

    • SHA512

      6abbc82db75c88da4b70094737c1982f3abadd3229966b5798847577cb9b25d69c2694f16fbd324fee1fc11335f3b7cebd28091a3834a0c26a423cb77bc4fc5f

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks